SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Politics : Formerly About Advanced Micro Devices -- Ignore unavailable to you. Want to Upgrade?


To: golfer72 who wrote (1547527)7/11/2025 7:55:28 PM
From: Broken_Clock4 Recommendations

Recommended By
golfer72
locogringo
longz
tntpal

  Respond to of 1584013
 
File under "we really are in trouble in this country"

$54M in Chinese gifts donated to UPenn, home of Biden Center

Apr 9, 2022 · A government watchdog is demanding the US attorney probing Hunter Biden in Delaware investigate tens of millions in anonymous donations from China to the University of

Comer: Anonymous Chinese Donations to UPenn Potentially Influenced Biden Administration Policies


Calls on the university to provide all documents and communications related to donations originating from China to UPenn and the Penn Biden Center

WASHINGTON—Today, House Committee on Oversight and Accountability Chairman James Comer (R-Ky.) is calling on University of Pennsylvania (UPenn) President M. Elizabeth Magill to provide information about anonymous Chinese donations to UPenn and the Penn Biden Center. Given the Biden family’s financial connections to foreign adversaries and the recent discovery of classified documents stashed in an unsecure closet at Penn Biden Center, Chairman Comer is requesting all documents and communications related to donations originating from China and a list of all Chinese donors—and the individual amount donated—to UPenn.

The Committee on Oversight and Accountability is investigating President Biden’s possible illegal handling of sensitive, highly classified documents.Recent reports reveal President Biden’s attorneys discovered Obama-Biden Administration documents in an unsecure closet at the Penn Biden Center for Diplomacy and Global Engagement—a Washington, D.C.-based think tank affiliated with the University of Pennsylvania,” wrote Chairman Comer. “President Biden’s pattern of mishandling classified documents is alarming. The Committee is concerned about who had access to these documents given the Biden family’s financial connections to foreign actors and companies. The American people deserve to know whether the Chinese Communist Party, through Chinese companies, influenced potential Biden Administration policies with large, anonymous donations to UPenn and the Penn Biden Center.”

The Committee has learned UPenn received millions of dollars from anonymous Chinese sources, with a marked uptick in donations when then-former Vice President Biden was announced as leading the Penn Biden Center initiative. Following the formation of the Penn Biden Center, donations originating from China tripled and continued while Joe Biden explored a potential run for President. In addition, the Committee is concerned that UPenn officials offered lucrative, foreign-funded salaries to President Biden’s closest political allies to secure senior posts in a future Biden Administration and foreign actors funded those salaries to influence a future government.

“The Penn Biden Center appears to have acted as a foreign-sponsored source of income for much of a Biden Administration in-waiting,” continued Chairman Comer. “Between 2017 and 2019, UPenn paid President Biden more than $900,000, and the university employed at least 10 people at the Penn Biden Center who later became senior Biden administration officials. This level of access and opportunity raises questions about who had access to the classified documents found at the Penn Biden Center. It is imperative to understand whether any Biden family members or associates gained access to the classified documents while stored at the Penn Biden Center.”

Read the letter to UPenn President Magill
here.







US Charges Chinese Man Accused Of Hacking Into Universities to Steal COVID-19 Research

by Tyler Durden

Friday, Jul 11, 2025 - 01:45 PM

Authored by Frank Fang via The Epoch Times (emphasis ours),

The Department of Justice (DOJ) announced charges on July 8 against a Chinese national taken into custody in Italy at the behest of Washington, and accused him of hacking into several U.S. universities to steal COVID-19 research at the direction of China’s main intelligence agency.

[url=]The Department of Justice (DOJ) in Washington on March 10, 2025. Madalina Vasiliu/The Epoch Times[/url]Xu Zewei, 33, was arrested in Milan, Italy, on July 3 by Italian law enforcement officials and FBI agents as he departed a plane from China. Xu and another Chinese national, Zhang Yu, 44, who remains at large, are charged in a nine-count indictment unsealed in the Southern District of Texas on Tuesday for their alleged involvement in computer intrusions between February 2020 and June 2021.

According to the indictment, Xu was a general manager at a Chinese company called Shanghai Powerock Network, which allegedly conducted hacking operations at the direction of the Shanghai State Security Bureau (SSSB) under China’s Ministry of State Security (MSS).

The DOJ said that Xu’s case exemplifies the Chinese regime’s use of a vast network of private companies and contractors in China to carry out hacking and information theft in a manner that concealed Beijing’s involvement.

The indictment alleges that Xu was hacking and stealing crucial COVID-19 research at the behest of the Chinese government while that same government was simultaneously withholding information about the virus and its origins,” Nicholas Ganjei, U.S. attorney for the Southern District of Texas, said in a statement.

“The Southern District of Texas has been waiting years to bring Xu to justice and that day is nearly at hand. As this case shows, even if it takes years, we will track hackers down and make them answer for their crimes. The United States does not forget.”

The CIA, FBI, and Energy Department have determined that the COVID-19 pandemic likely originated from a laboratory in China, an assessment that Beijing has dismissed. Chinese authorities initially downplayed the severity of the outbreak for several weeks before it escalated into a pandemic.

The FBI’s Houston Field Office, which is investigating the case, said that Xu is allegedly “one of the first hackers linked to Chinese intelligence services to be captured by the FBI,” according to a post on social media platform X on July 8.

Our investigation revealed that the PRC government will stop at nothing to steal from America. They have no shame in their actions, and no respect for international laws,” the Houston Field Office added in a separate X post. “Their only regret is that their criminal conduct is now unmasked and laid bare for the world to see.”

HackingXu and his coconspirators are accused of hacking the networks of several U.S.-based universities, as well as the email accounts of immunologists and virologists conducting research into COVID-19 vaccines, treatment, and testing.

Prosecutors did not name the universities. According to the indictment, two universities are based in the Southern District of Texas, identified only as “UNIVERSITY 1” and “UNIVERSITY 3,” and the third, identified only as “UNIVERSITY 2,” is located in North Carolina. An unnamed law firm, with offices in the United States and elsewhere, was also targeted.

Xu allegedly compromised the network of “UNIVERSITY 1” on Feb. 19, 2020, according to prosecutors. Three days later, an SSSB officer directed Xu to target and access certain email accounts belonging to the university’s virologists and immunologists. According to the indictment, Xu informed the officer that he had “acquired the contents of the mailboxes” days later.

Xu and Zhang are also accused of being part of a China-sponsored hacking group called Hafnium, which garnered global attention in 2021 after Microsoft identified the group for exploiting the vulnerabilities in its Exchange Server email program.

Through HAFNIUM, the CCP targeted over 60,000 U.S. entities, successfully victimizing more than 12,700 in order to steal sensitive information,” Brett Leatherman, assistant director of the FBI’s cyber division, said in a statement.

Xu and his coconspirators began exploiting the Exchange Server vulnerabilities in late 2020, prosecutors said. According to the indictment, Xu confirmed to Zhang that he had compromised the computer network of “UNIVERSITY 3” on Jan. 30, 2021, after the coconspirators breached the school’s computers running the Exchange Server and installed web shells on them to enable remote administration.

Using similar techniques associated with the Exchange Server, Xu and his coconspirators gained access to the law firm’s computer and used keywords such as “HongKong” and “MSS” to look for information regarding specific U.S. policymakers and government agencies.

The charges Xu faces include wire fraud, aggravated identity theft, and conspiracy to cause damage to and obtain information by unauthorized access to protected computers. He faces up to 20 years in prison for the wire fraud charges alone.

On Tuesday, Xu’s lawyer said that his client is a victim of mistaken identity, given that his surname is common in China, and his cellphone had been stolen since 2020.

Xu appeared before an appeals court in Milan and opposed extradition to the United States.

Reuters contributed to this report.